Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 23:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
61230f922120a18697f197e01635d880_NeikiAnalytics.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
61230f922120a18697f197e01635d880_NeikiAnalytics.exe
-
Size
247KB
-
MD5
61230f922120a18697f197e01635d880
-
SHA1
d7cd1ce566e2f175b728420db54a5bbefaa0de1a
-
SHA256
bff6d0cca96d3021f622e093f6ed843f8f1962e9b98247921e854afdb52d9941
-
SHA512
683e4e95626b73a115850e5b50ce688e337ffe2b6cff83ce2806fe8703f4c1f621da2631909676d26ca4b00c1eff366bfb89e1a6562218bbf677e3b2603b2a5c
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4MAWvGjR1q:n3C9BRo7MlrWKo+lxtvGt1q
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral1/memory/1712-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1868-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2116-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-278-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2208-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/884-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1044-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/956-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2044-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1228-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2456-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
9pjpd.exetnbbhn.exedpdjp.exeflrxrff.exe5thntb.exevpdvp.exevddjj.exefrlfllr.exettnhbh.exejjvdv.exefrflrfr.exe7nnhnn.exetnhtbh.exe3dppp.exelflrfrf.exebnnnhn.exevjvvj.exevpdvj.exellrxrrx.exetthbnt.exeddpjj.exexrlxlll.exerrflrxr.exebbthth.exevvjpj.exe1pdpd.exenbntnn.exejjvvj.exellllrxx.exeflxfxfl.exetnttnh.exedvpvj.exerxxllff.exe5lrrrrr.exetnbnnh.exevpjpv.exedvddd.exerrffxrl.exelrrxxxx.exeththtt.exeddddv.exepjjjp.exelrlfxrx.exetnbhnn.exevjdjv.exe3jdpp.exerfflfff.exellxrrxf.exebhhhht.exebtbhth.exe9ddvj.exerrxfrxl.exelfflxxf.exebbthtb.exe7dvdp.exeppjpp.exefrxfrxl.exerfrxxfl.exenhhtnh.exethnbhn.exedpppp.exepddvv.exerrrxrxr.exe1thnbh.exepid process 2392 9pjpd.exe 1868 tnbbhn.exe 2644 dpdjp.exe 2888 flrxrff.exe 2624 5thntb.exe 2724 vpdvp.exe 2456 vddjj.exe 1736 frlfllr.exe 2832 ttnhbh.exe 2836 jjvdv.exe 2996 frflrfr.exe 2704 7nnhnn.exe 2416 tnhtbh.exe 1856 3dppp.exe 320 lflrfrf.exe 2776 bnnnhn.exe 1556 vjvvj.exe 2116 vpdvj.exe 2260 llrxrrx.exe 1228 tthbnt.exe 2044 ddpjj.exe 956 xrlxlll.exe 2180 rrflrxr.exe 876 bbthth.exe 452 vvjpj.exe 1044 1pdpd.exe 2928 nbntnn.exe 2300 jjvvj.exe 884 llllrxx.exe 2208 flxfxfl.exe 1280 tnttnh.exe 1304 dvpvj.exe 1724 rxxllff.exe 2548 5lrrrrr.exe 2588 tnbnnh.exe 2128 vpjpv.exe 2152 dvddd.exe 2784 rrffxrl.exe 1656 lrrxxxx.exe 2452 ththtt.exe 1648 ddddv.exe 1268 pjjjp.exe 2848 lrlfxrx.exe 2676 tnbhnn.exe 2976 vjdjv.exe 3004 3jdpp.exe 1628 rfflfff.exe 1640 llxrrxf.exe 1972 bhhhht.exe 2712 btbhth.exe 2772 9ddvj.exe 1592 rrxfrxl.exe 1604 lfflxxf.exe 1432 bbthtb.exe 3064 7dvdp.exe 2104 ppjpp.exe 2328 frxfrxl.exe 2272 rfrxxfl.exe 1500 nhhtnh.exe 1828 thnbhn.exe 2180 dpppp.exe 1140 pddvv.exe 2088 rrrxrxr.exe 928 1thnbh.exe -
Processes:
resource yara_rule behavioral1/memory/1712-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1712-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1868-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2116-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-278-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-295-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/884-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/956-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2044-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1228-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-44-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
61230f922120a18697f197e01635d880_NeikiAnalytics.exe9pjpd.exetnbbhn.exedpdjp.exeflrxrff.exe5thntb.exevpdvp.exevddjj.exefrlfllr.exettnhbh.exejjvdv.exefrflrfr.exe7nnhnn.exetnhtbh.exe3dppp.exelflrfrf.exedescription pid process target process PID 1712 wrote to memory of 2392 1712 61230f922120a18697f197e01635d880_NeikiAnalytics.exe 9pjpd.exe PID 1712 wrote to memory of 2392 1712 61230f922120a18697f197e01635d880_NeikiAnalytics.exe 9pjpd.exe PID 1712 wrote to memory of 2392 1712 61230f922120a18697f197e01635d880_NeikiAnalytics.exe 9pjpd.exe PID 1712 wrote to memory of 2392 1712 61230f922120a18697f197e01635d880_NeikiAnalytics.exe 9pjpd.exe PID 2392 wrote to memory of 1868 2392 9pjpd.exe tnbbhn.exe PID 2392 wrote to memory of 1868 2392 9pjpd.exe tnbbhn.exe PID 2392 wrote to memory of 1868 2392 9pjpd.exe tnbbhn.exe PID 2392 wrote to memory of 1868 2392 9pjpd.exe tnbbhn.exe PID 1868 wrote to memory of 2644 1868 tnbbhn.exe dpdjp.exe PID 1868 wrote to memory of 2644 1868 tnbbhn.exe dpdjp.exe PID 1868 wrote to memory of 2644 1868 tnbbhn.exe dpdjp.exe PID 1868 wrote to memory of 2644 1868 tnbbhn.exe dpdjp.exe PID 2644 wrote to memory of 2888 2644 dpdjp.exe flrxrff.exe PID 2644 wrote to memory of 2888 2644 dpdjp.exe flrxrff.exe PID 2644 wrote to memory of 2888 2644 dpdjp.exe flrxrff.exe PID 2644 wrote to memory of 2888 2644 dpdjp.exe flrxrff.exe PID 2888 wrote to memory of 2624 2888 flrxrff.exe 5thntb.exe PID 2888 wrote to memory of 2624 2888 flrxrff.exe 5thntb.exe PID 2888 wrote to memory of 2624 2888 flrxrff.exe 5thntb.exe PID 2888 wrote to memory of 2624 2888 flrxrff.exe 5thntb.exe PID 2624 wrote to memory of 2724 2624 5thntb.exe vpdvp.exe PID 2624 wrote to memory of 2724 2624 5thntb.exe vpdvp.exe PID 2624 wrote to memory of 2724 2624 5thntb.exe vpdvp.exe PID 2624 wrote to memory of 2724 2624 5thntb.exe vpdvp.exe PID 2724 wrote to memory of 2456 2724 vpdvp.exe vddjj.exe PID 2724 wrote to memory of 2456 2724 vpdvp.exe vddjj.exe PID 2724 wrote to memory of 2456 2724 vpdvp.exe vddjj.exe PID 2724 wrote to memory of 2456 2724 vpdvp.exe vddjj.exe PID 2456 wrote to memory of 1736 2456 vddjj.exe frlfllr.exe PID 2456 wrote to memory of 1736 2456 vddjj.exe frlfllr.exe PID 2456 wrote to memory of 1736 2456 vddjj.exe frlfllr.exe PID 2456 wrote to memory of 1736 2456 vddjj.exe frlfllr.exe PID 1736 wrote to memory of 2832 1736 frlfllr.exe ttnhbh.exe PID 1736 wrote to memory of 2832 1736 frlfllr.exe ttnhbh.exe PID 1736 wrote to memory of 2832 1736 frlfllr.exe ttnhbh.exe PID 1736 wrote to memory of 2832 1736 frlfllr.exe ttnhbh.exe PID 2832 wrote to memory of 2836 2832 ttnhbh.exe jjvdv.exe PID 2832 wrote to memory of 2836 2832 ttnhbh.exe jjvdv.exe PID 2832 wrote to memory of 2836 2832 ttnhbh.exe jjvdv.exe PID 2832 wrote to memory of 2836 2832 ttnhbh.exe jjvdv.exe PID 2836 wrote to memory of 2996 2836 jjvdv.exe frflrfr.exe PID 2836 wrote to memory of 2996 2836 jjvdv.exe frflrfr.exe PID 2836 wrote to memory of 2996 2836 jjvdv.exe frflrfr.exe PID 2836 wrote to memory of 2996 2836 jjvdv.exe frflrfr.exe PID 2996 wrote to memory of 2704 2996 frflrfr.exe 7nnhnn.exe PID 2996 wrote to memory of 2704 2996 frflrfr.exe 7nnhnn.exe PID 2996 wrote to memory of 2704 2996 frflrfr.exe 7nnhnn.exe PID 2996 wrote to memory of 2704 2996 frflrfr.exe 7nnhnn.exe PID 2704 wrote to memory of 2416 2704 7nnhnn.exe tnhtbh.exe PID 2704 wrote to memory of 2416 2704 7nnhnn.exe tnhtbh.exe PID 2704 wrote to memory of 2416 2704 7nnhnn.exe tnhtbh.exe PID 2704 wrote to memory of 2416 2704 7nnhnn.exe tnhtbh.exe PID 2416 wrote to memory of 1856 2416 tnhtbh.exe 3dppp.exe PID 2416 wrote to memory of 1856 2416 tnhtbh.exe 3dppp.exe PID 2416 wrote to memory of 1856 2416 tnhtbh.exe 3dppp.exe PID 2416 wrote to memory of 1856 2416 tnhtbh.exe 3dppp.exe PID 1856 wrote to memory of 320 1856 3dppp.exe lflrfrf.exe PID 1856 wrote to memory of 320 1856 3dppp.exe lflrfrf.exe PID 1856 wrote to memory of 320 1856 3dppp.exe lflrfrf.exe PID 1856 wrote to memory of 320 1856 3dppp.exe lflrfrf.exe PID 320 wrote to memory of 2776 320 lflrfrf.exe bnnnhn.exe PID 320 wrote to memory of 2776 320 lflrfrf.exe bnnnhn.exe PID 320 wrote to memory of 2776 320 lflrfrf.exe bnnnhn.exe PID 320 wrote to memory of 2776 320 lflrfrf.exe bnnnhn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61230f922120a18697f197e01635d880_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\61230f922120a18697f197e01635d880_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\9pjpd.exec:\9pjpd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\tnbbhn.exec:\tnbbhn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
\??\c:\dpdjp.exec:\dpdjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\flrxrff.exec:\flrxrff.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\5thntb.exec:\5thntb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\vpdvp.exec:\vpdvp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\vddjj.exec:\vddjj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\frlfllr.exec:\frlfllr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\ttnhbh.exec:\ttnhbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\jjvdv.exec:\jjvdv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\frflrfr.exec:\frflrfr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\7nnhnn.exec:\7nnhnn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\tnhtbh.exec:\tnhtbh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\3dppp.exec:\3dppp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\lflrfrf.exec:\lflrfrf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:320 -
\??\c:\bnnnhn.exec:\bnnnhn.exe17⤵
- Executes dropped EXE
PID:2776 -
\??\c:\vjvvj.exec:\vjvvj.exe18⤵
- Executes dropped EXE
PID:1556 -
\??\c:\vpdvj.exec:\vpdvj.exe19⤵
- Executes dropped EXE
PID:2116 -
\??\c:\llrxrrx.exec:\llrxrrx.exe20⤵
- Executes dropped EXE
PID:2260 -
\??\c:\tthbnt.exec:\tthbnt.exe21⤵
- Executes dropped EXE
PID:1228 -
\??\c:\ddpjj.exec:\ddpjj.exe22⤵
- Executes dropped EXE
PID:2044 -
\??\c:\xrlxlll.exec:\xrlxlll.exe23⤵
- Executes dropped EXE
PID:956 -
\??\c:\rrflrxr.exec:\rrflrxr.exe24⤵
- Executes dropped EXE
PID:2180 -
\??\c:\bbthth.exec:\bbthth.exe25⤵
- Executes dropped EXE
PID:876 -
\??\c:\vvjpj.exec:\vvjpj.exe26⤵
- Executes dropped EXE
PID:452 -
\??\c:\1pdpd.exec:\1pdpd.exe27⤵
- Executes dropped EXE
PID:1044 -
\??\c:\nbntnn.exec:\nbntnn.exe28⤵
- Executes dropped EXE
PID:2928 -
\??\c:\jjvvj.exec:\jjvvj.exe29⤵
- Executes dropped EXE
PID:2300 -
\??\c:\llllrxx.exec:\llllrxx.exe30⤵
- Executes dropped EXE
PID:884 -
\??\c:\flxfxfl.exec:\flxfxfl.exe31⤵
- Executes dropped EXE
PID:2208 -
\??\c:\tnttnh.exec:\tnttnh.exe32⤵
- Executes dropped EXE
PID:1280 -
\??\c:\dvpvj.exec:\dvpvj.exe33⤵
- Executes dropped EXE
PID:1304 -
\??\c:\rxxllff.exec:\rxxllff.exe34⤵
- Executes dropped EXE
PID:1724 -
\??\c:\5lrrrrr.exec:\5lrrrrr.exe35⤵
- Executes dropped EXE
PID:2548 -
\??\c:\tnbnnh.exec:\tnbnnh.exe36⤵
- Executes dropped EXE
PID:2588 -
\??\c:\vpjpv.exec:\vpjpv.exe37⤵
- Executes dropped EXE
PID:2128 -
\??\c:\dvddd.exec:\dvddd.exe38⤵
- Executes dropped EXE
PID:2152 -
\??\c:\rrffxrl.exec:\rrffxrl.exe39⤵
- Executes dropped EXE
PID:2784 -
\??\c:\lrrxxxx.exec:\lrrxxxx.exe40⤵
- Executes dropped EXE
PID:1656 -
\??\c:\ththtt.exec:\ththtt.exe41⤵
- Executes dropped EXE
PID:2452 -
\??\c:\ddddv.exec:\ddddv.exe42⤵
- Executes dropped EXE
PID:1648 -
\??\c:\pjjjp.exec:\pjjjp.exe43⤵
- Executes dropped EXE
PID:1268 -
\??\c:\lrlfxrx.exec:\lrlfxrx.exe44⤵
- Executes dropped EXE
PID:2848 -
\??\c:\tnbhnn.exec:\tnbhnn.exe45⤵
- Executes dropped EXE
PID:2676 -
\??\c:\vjdjv.exec:\vjdjv.exe46⤵
- Executes dropped EXE
PID:2976 -
\??\c:\3jdpp.exec:\3jdpp.exe47⤵
- Executes dropped EXE
PID:3004 -
\??\c:\rfflfff.exec:\rfflfff.exe48⤵
- Executes dropped EXE
PID:1628 -
\??\c:\llxrrxf.exec:\llxrrxf.exe49⤵
- Executes dropped EXE
PID:1640 -
\??\c:\bhhhht.exec:\bhhhht.exe50⤵
- Executes dropped EXE
PID:1972 -
\??\c:\btbhth.exec:\btbhth.exe51⤵
- Executes dropped EXE
PID:2712 -
\??\c:\9ddvj.exec:\9ddvj.exe52⤵
- Executes dropped EXE
PID:2772 -
\??\c:\rrxfrxl.exec:\rrxfrxl.exe53⤵
- Executes dropped EXE
PID:1592 -
\??\c:\lfflxxf.exec:\lfflxxf.exe54⤵
- Executes dropped EXE
PID:1604 -
\??\c:\bbthtb.exec:\bbthtb.exe55⤵
- Executes dropped EXE
PID:1432 -
\??\c:\7dvdp.exec:\7dvdp.exe56⤵
- Executes dropped EXE
PID:3064 -
\??\c:\ppjpp.exec:\ppjpp.exe57⤵
- Executes dropped EXE
PID:2104 -
\??\c:\frxfrxl.exec:\frxfrxl.exe58⤵
- Executes dropped EXE
PID:2328 -
\??\c:\rfrxxfl.exec:\rfrxxfl.exe59⤵
- Executes dropped EXE
PID:2272 -
\??\c:\nhhtnh.exec:\nhhtnh.exe60⤵
- Executes dropped EXE
PID:1500 -
\??\c:\thnbhn.exec:\thnbhn.exe61⤵
- Executes dropped EXE
PID:1828 -
\??\c:\dpppp.exec:\dpppp.exe62⤵
- Executes dropped EXE
PID:2180 -
\??\c:\pddvv.exec:\pddvv.exe63⤵
- Executes dropped EXE
PID:1140 -
\??\c:\rrrxrxr.exec:\rrrxrxr.exe64⤵
- Executes dropped EXE
PID:2088 -
\??\c:\1thnbh.exec:\1thnbh.exe65⤵
- Executes dropped EXE
PID:928 -
\??\c:\7bhhnn.exec:\7bhhnn.exe66⤵PID:1040
-
\??\c:\jpppp.exec:\jpppp.exe67⤵PID:1704
-
\??\c:\jvvpp.exec:\jvvpp.exe68⤵PID:2076
-
\??\c:\rxxrxrl.exec:\rxxrxrl.exe69⤵PID:1516
-
\??\c:\ttbtbh.exec:\ttbtbh.exe70⤵PID:3052
-
\??\c:\hbntbh.exec:\hbntbh.exe71⤵PID:2756
-
\??\c:\9vvjp.exec:\9vvjp.exe72⤵PID:1804
-
\??\c:\rfxxlxl.exec:\rfxxlxl.exe73⤵PID:1272
-
\??\c:\7hnthn.exec:\7hnthn.exe74⤵PID:2132
-
\??\c:\jvjjv.exec:\jvjjv.exe75⤵PID:2660
-
\??\c:\pdvdj.exec:\pdvdj.exe76⤵PID:2580
-
\??\c:\lxrxllx.exec:\lxrxllx.exe77⤵PID:820
-
\??\c:\ntbnnh.exec:\ntbnnh.exe78⤵PID:2752
-
\??\c:\3jvdj.exec:\3jvdj.exe79⤵PID:2564
-
\??\c:\rrrlxfl.exec:\rrrlxfl.exe80⤵PID:2884
-
\??\c:\rfrrlrl.exec:\rfrrlrl.exe81⤵PID:1656
-
\??\c:\5tnnnh.exec:\5tnnnh.exe82⤵PID:2456
-
\??\c:\ppdjj.exec:\ppdjj.exe83⤵PID:2296
-
\??\c:\rlllrfx.exec:\rlllrfx.exe84⤵PID:2824
-
\??\c:\bthnnt.exec:\bthnnt.exe85⤵PID:2628
-
\??\c:\5rlrlfr.exec:\5rlrlfr.exe86⤵PID:2860
-
\??\c:\ntnhhb.exec:\ntnhhb.exe87⤵PID:2968
-
\??\c:\jpppp.exec:\jpppp.exe88⤵PID:2940
-
\??\c:\5xlxxrf.exec:\5xlxxrf.exe89⤵PID:2700
-
\??\c:\fllxfxx.exec:\fllxfxx.exe90⤵PID:2984
-
\??\c:\3tbnht.exec:\3tbnht.exe91⤵PID:2496
-
\??\c:\pjdpv.exec:\pjdpv.exe92⤵PID:1588
-
\??\c:\lrfrlrl.exec:\lrfrlrl.exe93⤵PID:2788
-
\??\c:\5hhbbt.exec:\5hhbbt.exe94⤵PID:2692
-
\??\c:\ppddj.exec:\ppddj.exe95⤵PID:1520
-
\??\c:\btnhhh.exec:\btnhhh.exe96⤵PID:1556
-
\??\c:\1jvdd.exec:\1jvdd.exe97⤵PID:1808
-
\??\c:\fffffxr.exec:\fffffxr.exe98⤵PID:1632
-
\??\c:\ntbnbb.exec:\ntbnbb.exe99⤵PID:2060
-
\??\c:\jvddd.exec:\jvddd.exe100⤵PID:2780
-
\??\c:\fxfflrr.exec:\fxfflrr.exe101⤵PID:2540
-
\??\c:\btnttb.exec:\btnttb.exe102⤵PID:1492
-
\??\c:\5thbnh.exec:\5thbnh.exe103⤵PID:852
-
\??\c:\jjjpp.exec:\jjjpp.exe104⤵PID:2052
-
\??\c:\lrlrxrr.exec:\lrlrxrr.exe105⤵PID:1100
-
\??\c:\7rrxlxx.exec:\7rrxlxx.exe106⤵PID:1444
-
\??\c:\5hthnt.exec:\5hthnt.exe107⤵PID:972
-
\??\c:\pvpvj.exec:\pvpvj.exe108⤵PID:1668
-
\??\c:\3pjdj.exec:\3pjdj.exe109⤵PID:2064
-
\??\c:\rrfxrrl.exec:\rrfxrrl.exe110⤵PID:2264
-
\??\c:\tbbhnh.exec:\tbbhnh.exe111⤵PID:2192
-
\??\c:\nhnnhh.exec:\nhnnhh.exe112⤵PID:292
-
\??\c:\djpjv.exec:\djpjv.exe113⤵PID:708
-
\??\c:\rfxxxrl.exec:\rfxxxrl.exe114⤵PID:1336
-
\??\c:\bttthh.exec:\bttthh.exe115⤵PID:2120
-
\??\c:\bthntt.exec:\bthntt.exe116⤵PID:2656
-
\??\c:\7pjvp.exec:\7pjvp.exe117⤵PID:2588
-
\??\c:\ffffrrx.exec:\ffffrrx.exe118⤵PID:1796
-
\??\c:\3xffrff.exec:\3xffrff.exe119⤵PID:2732
-
\??\c:\hbhhhh.exec:\hbhhhh.exe120⤵PID:2740
-
\??\c:\vpddp.exec:\vpddp.exe121⤵PID:2600
-
\??\c:\9dpvv.exec:\9dpvv.exe122⤵PID:2492
-
\??\c:\lrxlxll.exec:\lrxlxll.exe123⤵PID:2472
-
\??\c:\hbnttt.exec:\hbnttt.exe124⤵PID:1760
-
\??\c:\thbtth.exec:\thbtth.exe125⤵PID:2144
-
\??\c:\ppvpv.exec:\ppvpv.exe126⤵PID:2804
-
\??\c:\xfrxlxr.exec:\xfrxlxr.exe127⤵PID:1056
-
\??\c:\5rffffl.exec:\5rffffl.exe128⤵PID:1688
-
\??\c:\3nbtbb.exec:\3nbtbb.exe129⤵PID:2968
-
\??\c:\pjjjp.exec:\pjjjp.exe130⤵PID:2940
-
\??\c:\9vpvd.exec:\9vpvd.exe131⤵PID:3004
-
\??\c:\lfrrxxf.exec:\lfrrxxf.exe132⤵PID:1628
-
\??\c:\hhttnt.exec:\hhttnt.exe133⤵PID:1640
-
\??\c:\5vdpv.exec:\5vdpv.exe134⤵PID:552
-
\??\c:\ffrfffr.exec:\ffrfffr.exe135⤵PID:2712
-
\??\c:\lfrllxf.exec:\lfrllxf.exe136⤵PID:2136
-
\??\c:\bhbtnb.exec:\bhbtnb.exe137⤵PID:1592
-
\??\c:\jjvjd.exec:\jjvjd.exe138⤵PID:3016
-
\??\c:\fxrrrxl.exec:\fxrrrxl.exe139⤵PID:1432
-
\??\c:\5bnbhn.exec:\5bnbhn.exe140⤵PID:3064
-
\??\c:\rllllfx.exec:\rllllfx.exe141⤵PID:2060
-
\??\c:\fxrrxrf.exec:\fxrrxrf.exe142⤵PID:2780
-
\??\c:\hbnnnn.exec:\hbnnnn.exe143⤵PID:1228
-
\??\c:\nntntt.exec:\nntntt.exe144⤵PID:1492
-
\??\c:\5xxrxrr.exec:\5xxrxrr.exe145⤵PID:852
-
\??\c:\bbbtbn.exec:\bbbtbn.exe146⤵PID:2068
-
\??\c:\pdddj.exec:\pdddj.exe147⤵PID:652
-
\??\c:\pdddd.exec:\pdddd.exe148⤵PID:2524
-
\??\c:\vppdv.exec:\vppdv.exe149⤵PID:972
-
\??\c:\rrxlxll.exec:\rrxlxll.exe150⤵PID:2876
-
\??\c:\frrlflr.exec:\frrlflr.exe151⤵PID:1980
-
\??\c:\hbnntb.exec:\hbnntb.exe152⤵PID:2188
-
\??\c:\jdpvv.exec:\jdpvv.exe153⤵PID:2196
-
\??\c:\vvjpd.exec:\vvjpd.exe154⤵PID:292
-
\??\c:\xflfrxx.exec:\xflfrxx.exe155⤵PID:3044
-
\??\c:\hhhbtb.exec:\hhhbtb.exe156⤵PID:1336
-
\??\c:\jvppv.exec:\jvppv.exe157⤵PID:2120
-
\??\c:\fxffflr.exec:\fxffflr.exe158⤵PID:2656
-
\??\c:\7rlxfff.exec:\7rlxfff.exe159⤵PID:2588
-
\??\c:\tbtbnb.exec:\tbtbnb.exe160⤵PID:1796
-
\??\c:\dvvjj.exec:\dvvjj.exe161⤵PID:2632
-
\??\c:\djpjd.exec:\djpjd.exe162⤵PID:2740
-
\??\c:\xrxlxrl.exec:\xrxlxrl.exe163⤵PID:2600
-
\??\c:\tnhbtb.exec:\tnhbtb.exe164⤵PID:2492
-
\??\c:\pvdvd.exec:\pvdvd.exe165⤵PID:2472
-
\??\c:\1ddpv.exec:\1ddpv.exe166⤵PID:1736
-
\??\c:\xlffffr.exec:\xlffffr.exe167⤵PID:2144
-
\??\c:\9tbttt.exec:\9tbttt.exe168⤵PID:2980
-
\??\c:\hbnbnt.exec:\hbnbnt.exe169⤵PID:2428
-
\??\c:\9jjvd.exec:\9jjvd.exe170⤵PID:1788
-
\??\c:\ddvjj.exec:\ddvjj.exe171⤵PID:2972
-
\??\c:\1lflxxf.exec:\1lflxxf.exe172⤵PID:2704
-
\??\c:\7hhhnn.exec:\7hhhnn.exe173⤵PID:2160
-
\??\c:\nbhhth.exec:\nbhhth.exe174⤵PID:1856
-
\??\c:\jdjjp.exec:\jdjjp.exe175⤵PID:1664
-
\??\c:\rlrrrxl.exec:\rlrrrxl.exe176⤵PID:2776
-
\??\c:\hnnbnb.exec:\hnnbnb.exe177⤵PID:2108
-
\??\c:\3dppv.exec:\3dppv.exe178⤵PID:3032
-
\??\c:\pdpjp.exec:\pdpjp.exe179⤵PID:2768
-
\??\c:\1rrxrxl.exec:\1rrxrxl.exe180⤵PID:1508
-
\??\c:\lfrxflr.exec:\lfrxflr.exe181⤵PID:324
-
\??\c:\hhhhbb.exec:\hhhhbb.exe182⤵PID:2044
-
\??\c:\nhbntt.exec:\nhbntt.exe183⤵PID:1484
-
\??\c:\pjpvd.exec:\pjpvd.exe184⤵PID:2412
-
\??\c:\5lrxllr.exec:\5lrxllr.exe185⤵PID:1800
-
\??\c:\lfxfllx.exec:\lfxfllx.exe186⤵PID:1008
-
\??\c:\hhhhtb.exec:\hhhhtb.exe187⤵PID:1768
-
\??\c:\7bnnht.exec:\7bnnht.exe188⤵PID:852
-
\??\c:\1jdjd.exec:\1jdjd.exe189⤵PID:1048
-
\??\c:\fxxfllr.exec:\fxxfllr.exe190⤵PID:596
-
\??\c:\5thhnb.exec:\5thhnb.exe191⤵PID:2520
-
\??\c:\9htnbt.exec:\9htnbt.exe192⤵PID:628
-
\??\c:\pjddp.exec:\pjddp.exe193⤵PID:2012
-
\??\c:\9xfxxfx.exec:\9xfxxfx.exe194⤵PID:2872
-
\??\c:\thhnbt.exec:\thhnbt.exe195⤵PID:2148
-
\??\c:\pdpjv.exec:\pdpjv.exe196⤵PID:1732
-
\??\c:\pjdpj.exec:\pjdpj.exe197⤵PID:292
-
\??\c:\fxlfrrx.exec:\fxlfrrx.exe198⤵PID:2252
-
\??\c:\7rxlxfr.exec:\7rxlxfr.exe199⤵PID:1868
-
\??\c:\hhbbnn.exec:\hhbbnn.exe200⤵PID:872
-
\??\c:\7nthnt.exec:\7nthnt.exe201⤵PID:2592
-
\??\c:\dddvd.exec:\dddvd.exe202⤵PID:2596
-
\??\c:\xlrrxfl.exec:\xlrrxfl.exe203⤵PID:2476
-
\??\c:\ffrlrff.exec:\ffrlrff.exe204⤵PID:2724
-
\??\c:\bhhtbb.exec:\bhhtbb.exe205⤵PID:2488
-
\??\c:\pdpdp.exec:\pdpdp.exe206⤵PID:2204
-
\??\c:\pjdjj.exec:\pjdjj.exe207⤵PID:2492
-
\??\c:\rxfxflx.exec:\rxfxflx.exe208⤵PID:2864
-
\??\c:\nbbnnb.exec:\nbbnnb.exe209⤵PID:2856
-
\??\c:\vdpjp.exec:\vdpjp.exe210⤵PID:1636
-
\??\c:\rflffll.exec:\rflffll.exe211⤵PID:2792
-
\??\c:\3fxxlrf.exec:\3fxxlrf.exe212⤵PID:1684
-
\??\c:\9bnttb.exec:\9bnttb.exe213⤵PID:2508
-
\??\c:\nthnhn.exec:\nthnhn.exe214⤵PID:1692
-
\??\c:\ddpdp.exec:\ddpdp.exe215⤵PID:2680
-
\??\c:\vvvpv.exec:\vvvpv.exe216⤵PID:2796
-
\??\c:\frfxlll.exec:\frfxlll.exe217⤵PID:2320
-
\??\c:\nbhbtn.exec:\nbhbtn.exe218⤵PID:1448
-
\??\c:\9jdpp.exec:\9jdpp.exe219⤵PID:2960
-
\??\c:\dvdpd.exec:\dvdpd.exe220⤵PID:1192
-
\??\c:\lfxxllx.exec:\lfxxllx.exe221⤵PID:2236
-
\??\c:\3rlrxxl.exec:\3rlrxxl.exe222⤵PID:1244
-
\??\c:\bnbtnt.exec:\bnbtnt.exe223⤵PID:688
-
\??\c:\thbhbb.exec:\thbhbb.exe224⤵PID:584
-
\??\c:\jjdpv.exec:\jjdpv.exe225⤵PID:2688
-
\??\c:\1frrrxf.exec:\1frrrxf.exe226⤵PID:1540
-
\??\c:\xrxxxrl.exec:\xrxxxrl.exe227⤵PID:1500
-
\??\c:\9bthtb.exec:\9bthtb.exe228⤵PID:2408
-
\??\c:\bbtnht.exec:\bbtnht.exe229⤵PID:1400
-
\??\c:\7pddp.exec:\7pddp.exe230⤵PID:1140
-
\??\c:\rxrrlll.exec:\rxrrlll.exe231⤵PID:2088
-
\??\c:\rlffxxf.exec:\rlffxxf.exe232⤵PID:2928
-
\??\c:\bnttbb.exec:\bnttbb.exe233⤵PID:716
-
\??\c:\dvdpp.exec:\dvdpp.exe234⤵PID:1704
-
\??\c:\vdjjp.exec:\vdjjp.exe235⤵PID:1644
-
\??\c:\9llxlfl.exec:\9llxlfl.exe236⤵PID:1516
-
\??\c:\hbttbh.exec:\hbttbh.exe237⤵PID:2872
-
\??\c:\thnbhn.exec:\thnbhn.exe238⤵PID:2392
-
\??\c:\vvddp.exec:\vvddp.exe239⤵PID:1696
-
\??\c:\ffxfxlx.exec:\ffxfxlx.exe240⤵PID:1880
-
\??\c:\bnbntn.exec:\bnbntn.exe241⤵PID:2636
-
\??\c:\5bbtnt.exec:\5bbtnt.exe242⤵PID:2748